Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13342: CWE-862 Missing Authorization in shabti Frontend Admin by DynamiApps

0
Critical
VulnerabilityCVE-2025-13342cvecve-2025-13342cwe-862
Published: Wed Dec 03 2025 (12/03/2025, 12:29:55 UTC)
Source: CVE Database V5
Vendor/Project: shabti
Product: Frontend Admin by DynamiApps

Description

CVE-2025-13342 is a critical vulnerability in the Frontend Admin by DynamiApps WordPress plugin (up to version 3. 28. 20) that allows unauthenticated attackers to modify arbitrary WordPress options. Due to missing authorization checks and insufficient input validation in the ActionOptions::run() save handler, attackers can change critical settings such as user registration permissions, default user roles, and admin email addresses by submitting crafted form data to public frontend forms. This vulnerability has a CVSS score of 9. 8, indicating a high potential impact on confidentiality, integrity, and availability without requiring authentication or user interaction. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make this a significant threat to WordPress sites using this plugin. European organizations relying on WordPress with this plugin are at risk of unauthorized site configuration changes, potentially leading to account takeover, privilege escalation, or denial of service. Mitigation requires immediate plugin updates once available or disabling the plugin until patched, alongside monitoring for suspicious changes to WordPress options. Countries with high WordPress adoption and significant digital infrastructure, such as Germany, France, the UK, Italy, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 12/10/2025, 13:45:16 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13342 affects the Frontend Admin by DynamiApps plugin for WordPress, versions up to and including 3.28.20. It stems from a missing authorization check (CWE-862) in the ActionOptions::run() save handler, which processes form submissions on the public frontend. This flaw allows unauthenticated attackers to submit specially crafted form data to modify arbitrary WordPress options without any capability validation. Critical options vulnerable to modification include users_can_register (which controls whether new users can register), default_role (which sets the default role for new users), and admin_email (which is used for administrative notifications). By altering these options, attackers can enable open registration, assign elevated privileges to new users, or redirect administrative communications, facilitating further compromise. The vulnerability is remotely exploitable over the network without authentication or user interaction, reflected in its CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Although no exploits have been publicly observed yet, the straightforward exploitation vector and high impact on confidentiality, integrity, and availability make this a critical risk. The plugin’s widespread use in WordPress sites increases the attack surface, especially for organizations relying on this plugin for frontend administration. The lack of a patch at the time of disclosure necessitates immediate defensive measures to prevent exploitation.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security and stability of WordPress-based websites. Unauthorized modification of critical WordPress options can lead to unauthorized user registrations with elevated privileges, enabling attackers to gain administrative access and potentially compromise entire websites. Altering the admin_email option can redirect security alerts and password reset emails, facilitating stealthy account takeovers. This can result in data breaches, defacement, service disruption, and loss of customer trust. Organizations that rely on WordPress for e-commerce, customer portals, or public-facing services may face operational downtime and reputational damage. Additionally, compliance with GDPR and other data protection regulations may be impacted if personal data is exposed or manipulated due to this vulnerability. The ease of exploitation without authentication increases the likelihood of automated attacks targeting vulnerable sites across Europe.

Mitigation Recommendations

Immediate mitigation steps include disabling the Frontend Admin by DynamiApps plugin until a security patch is released. Organizations should monitor WordPress option changes, especially users_can_register, default_role, and admin_email, for unauthorized modifications. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting the plugin’s frontend forms. Restrict access to frontend administration forms using IP whitelisting or CAPTCHA challenges to reduce automated exploitation risk. Conduct thorough audits of user accounts and roles to identify and remove any unauthorized users or privilege escalations. Keep WordPress core and all plugins updated regularly, and subscribe to security advisories from DynamiApps and WordPress security communities. Consider deploying intrusion detection systems (IDS) to alert on anomalous configuration changes. Finally, educate site administrators on the risks and signs of compromise related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-17T23:15:13.995Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69302ef1720cedca79452385

Added to database: 12/3/2025, 12:37:05 PM

Last enriched: 12/10/2025, 1:45:16 PM

Last updated: 1/19/2026, 11:55:13 AM

Views: 165

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats